exfiltration.proto 2.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152
  1. // Copyright 2022 Google LLC
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. syntax = "proto3";
  15. package google.cloud.securitycenter.v1;
  16. option csharp_namespace = "Google.Cloud.SecurityCenter.V1";
  17. option go_package = "google.golang.org/genproto/googleapis/cloud/securitycenter/v1;securitycenter";
  18. option java_multiple_files = true;
  19. option java_outer_classname = "ExfiltrationProto";
  20. option java_package = "com.google.cloud.securitycenter.v1";
  21. option php_namespace = "Google\\Cloud\\SecurityCenter\\V1";
  22. option ruby_package = "Google::Cloud::SecurityCenter::V1";
  23. // Exfiltration represents a data exfiltration attempt of one or more
  24. // sources to one or more targets. Sources represent the source
  25. // of data that is exfiltrated, and Targets represents the destination the
  26. // data was copied to.
  27. message Exfiltration {
  28. // If there are multiple sources, then the data is considered "joined" between
  29. // them. For instance, BigQuery can join multiple tables, and each
  30. // table would be considered a source.
  31. repeated ExfilResource sources = 1;
  32. // If there are multiple targets, each target would get a complete copy of the
  33. // "joined" source data.
  34. repeated ExfilResource targets = 2;
  35. }
  36. // Resource that has been exfiltrated or exfiltrated_to.
  37. message ExfilResource {
  38. // Resource's URI (https://google.aip.dev/122#full-resource-names)
  39. string name = 1;
  40. // Subcomponents of the asset that is exfiltrated - these could be
  41. // URIs used during exfiltration, table names, databases, filenames, etc.
  42. // For example, multiple tables may be exfiltrated from the same CloudSQL
  43. // instance, or multiple files from the same Cloud Storage bucket.
  44. repeated string components = 2;
  45. }